Version
By |
Version |
Comment |
noraj |
1.0 |
Creation |
CTF
- Name : European Cyber Week CTF Quals 2016
- Website : challenge-ecw.fr
- Type : Online
- Format : Jeopardy - Student
Description
N.A.
Solution
We used Digital Forensics Framework (DFF)
We can view that usb.dd is NTFS partition in the hex view so we mounted it as it.
We browsed the files and this one retaind our attention: usb.dd/NTFS/Users/windows/Documents/tmp_rqsu78.docx:flag
.
Its content is:
So we need to find Windows registry and browse it.
The location of these registry hives are as follows:
HKEY_LOCAL_MACHINE \SYSTEM
: \system32\config\system
Source: http://www.thewindowsclub.com/where-are-the-windows-registry-files-located-in-windows-7
We browsed it and the value of the key was: a2486aac827711258d0642176cc4f8c2
.
So the flag is ECW{a2486aac827711258d0642176cc4f8c2}
.
Bonus:
/Logical files/temp/usb.dd/NTFS/!j3CtfuSD5zz1RfB=MlsL]u-k8O5v+,P
was certainly the target location of the attack.
- There was also a
no flag here.txt
troll file in Windows\system32\config\
containing a pretty list of fake flags: